Analysis

  • max time kernel
    34s
  • max time network
    156s
  • platform
    android_x86
  • resource
    android-x86-arm-20240624-en
  • resource tags

    androidarch:armarch:x86image:android-x86-arm-20240624-enlocale:en-usos:android-9-x86system
  • submitted
    18/01/2025, 22:03

General

  • Target

    c09011b78cbe43730394d81184a1b9a12ce6b8c78f0c8b726e56d7920d7912b8.apk

  • Size

    2.4MB

  • MD5

    2cb1098e144f8f65541d9f72f22a5ebf

  • SHA1

    ed945df638f55279c4d3700fec4b6a7c7a2d8137

  • SHA256

    c09011b78cbe43730394d81184a1b9a12ce6b8c78f0c8b726e56d7920d7912b8

  • SHA512

    5c29d74229a6e2e1ae65adf109ec40025ae6c53cec1512f2529cbb85245e222f03386726ff650dc050120975b4cdb82012b8ad2d348dab103af57a930ccf4cf9

  • SSDEEP

    49152:FHtONEZ+8/s00WFXwDfNIUj2kkAoLmHCdDWjwKSLPBQfs0dgeEQr:7HBVGHj2kox6NCPBmldEQr

Malware Config

Extracted

Family

octo

C2

https://91.215.85.142/NTA4MzIxMjdkYzNj/

https://edfwn923sfdml237vm90sdl23k.com/NTA4MzIxMjdkYzNj/

https://823jkfs4829nk48kef742kj675.com/NTA4MzIxMjdkYzNj/

https://sdglk33498knsf32667sfknwfr.com/NTA4MzIxMjdkYzNj/

https://952dsjk47kf73ls23k489klfdd.com/NTA4MzIxMjdkYzNj/

https://nzxvjej7337bjsdl232nsdlsfa.com/NTA4MzIxMjdkYzNj/

https://2348sdks230df834sd03272nsd.com/NTA4MzIxMjdkYzNj/

rc4.plain

Extracted

Family

octo

C2

https://91.215.85.142/NTA4MzIxMjdkYzNj/

https://edfwn923sfdml237vm90sdl23k.com/NTA4MzIxMjdkYzNj/

https://823jkfs4829nk48kef742kj675.com/NTA4MzIxMjdkYzNj/

https://sdglk33498knsf32667sfknwfr.com/NTA4MzIxMjdkYzNj/

https://952dsjk47kf73ls23k489klfdd.com/NTA4MzIxMjdkYzNj/

https://nzxvjej7337bjsdl232nsdlsfa.com/NTA4MzIxMjdkYzNj/

https://2348sdks230df834sd03272nsd.com/NTA4MzIxMjdkYzNj/

AES_key

Signatures

Processes

  • com.standwarmv
    1⤵
    • Loads dropped Dex/Jar
    • Makes use of the framework's Accessibility service
    • Acquires the wake lock
    • Makes use of the framework's foreground persistence service
    • Performs UI accessibility actions on behalf of the user
    • Queries the mobile country code (MCC)
    • Requests accessing notifications (often used to intercept notifications before users become aware).
    • Requests disabling of battery optimizations (often used to enable hiding in the background).
    • Registers a broadcast receiver at runtime (usually for listening for system events)
    • Uses Crypto APIs (Might try to encrypt user data)
    PID:4244

Network

MITRE ATT&CK Mobile v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • /data/data/com.standwarmv/cache/buigopghbjftb

    Filesize

    2.3MB

    MD5

    76578626b833a11e59cbeee7c67c3d0b

    SHA1

    ce084ff415f830ac44950059af1077e646242e1b

    SHA256

    0c7313488d07185a0897fea39d8b323ef2cf59c20d0ed22c173d33e4e1fd7bb3

    SHA512

    62702a97d8cd504f7e9817876152e4d52b9f9fa94725a31fcd0c7fbe5cc4027102d51a99f90292c22d1d5182fa359be2984174d7bee96830b1a7bf59dca6b7e7